CEH EXAM OBJECTIVES COVERED IN THIS CHAPTER:
Understand the types of DoS attacks
Understand how a DDoS attack works
Understand how BOTs/BOTNETs work
What is a "smurf" attack?
What is "SYN" flooding?
Describe the DoS/DDoS countermeasures
Understand spoofing vs. hijacking
List the types of session hijacking
Understand sequence prediction
What are the steps in performing session hijacking?
Describe how you would prevent session hijacking
Session hijacking is a hacking method that creates a temporary DoS for an end user when an attacker takes over the session. Session hijacking is used by hackers to take over a ...